Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk (上海交大)
Novel Encryption Method of GPS Information in Image File Using - - PowerPoint PPT Presentation
Novel Encryption Method of GPS Information in Image File Using - - PowerPoint PPT Presentation
Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk (
TABLE OF CONTENTS
02 05 03 06
STATE OF THE ART CONCLUSION BACKGROUND
01
EXPERIMENTS
04
INTRODUCTION RESULTS
BACKGROUND 01
Background
Format-Preserving Encryption (FPE) Exchangeable Image File Format (EXIF) No other existing proposals for encrypting EXIF Global Positioning System (GPS) Privacy
INTRODUCTION 02
Measuring GPS in Smartphones
A-GPS Cell-ID Wi-Fi P-Cell
Synchronize GPS satellite position and current time by 3G or 4G communication networks 3G or 4G signals received from base station Signal of wireless router identifying location Builds database based on information in surrounding environment and compares to information received from device
EXIF
Where longitude / latitude / direction / altitude How smartphone, camera, etc Data Travels
Across devices, software, etc
Photo storage services
Google images, WeChat Moments, Weibo, Facebook, Instagram ( Some services strip EXIF data )
When date time stamps
“Can be a gold mine of information”
—SOMEONE FAMOUS
Format-Preserving Encryption
- Encrypt plaintext with values of same format
○ Vulnerable to codebook attack if plaintext is short
- Defense
○ Tweaking, Cycle-walking, Ranking ■ Tweak is additional input values to make up for short plaintext ■ Cycle-walking is Vulnerable to side-channel attacks ■ P-NP problems can’t effjciently apply Ranking
- Thus, FPE is not used in this paper’s proposal
STATE OF THE ART 03
FE1 Algorithm
Calculation of L and R values - R is entered in round function along with key, tweak, and corresponding # of rounds Round function algorithms: HMAC and AES. Calculate XOR with L. Then attach to existing value R. Unbalanced Feistel Network - divide plain into unequal lengths
Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot—even hotter than Mercury—and its atmosphere is extremely poisonous. It’s the second-brightest natural object in the night sky after the Moon
VISION
12
Design of GPS Encryption using FE1
Encryption Process shown below is the same as Decryption Process
EXPERIMENTS 04
Exceed Google Map Range Value (Intended) Real Location Searched on Google Maps
RESULTS 05
Here you could describe the topic of the section
Discussion of Results
Time Complexity: n^2 SPECS: CPU I5-8500 Windows 10
Discussion of Results
Triangle = EXIF GPS data found Circle = EXIF GPS data not found
CONCLUSION 06
Conclusion and Potential
5,408 Followers 5,408 Followers 5,608 Views 608 Followers 5,608 Likes 5,608 Followers
AGE
- Novel Encryption Approach
○ Lack of Defense ○ Lack of Significant Experimentation ○ Area is capable for further research
- EXIF GPS implications
○ Treasure cove of data is stored in photos ■ If a photo service is hacked, a lot of personal information can be more exposed than intended